- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company
MD 9-10: 10.NI.C.01
CodeHS Lessons
Illustrate how sensitive data and critical infrastructure can be affected by malware and other attacks and recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
Standard |
5.1 Network Attacks |
5.2 Malware Types and Prevention |
5.3 Common Network Attacks |
5.5 Cross-site Scripting |
8.2 Assessing Risks |
Standard |
13.7 Network Attacks |
13.9 Impact of Cybersecurity |
13.1 What is Cybersecurity? |
Standard |
9.4 Privacy & Security |
15.3 Impact of Cybersecurity |
15.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.2 Impact of Cybersecurity |
1.7 Privacy & Security |
12.9 Common Security Problems |
12.11 Types of SQLi and Prevention |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
2.8 Network Administration |
4.1 What is Cybersecurity? |
4.2 Impact of Cybersecurity |
4.5 Privacy & Security |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
8.2 Impact of Cybersecurity |
8.3 Network Attacks |
8.4 Malware Types and Prevention |
8.5 Common Network Attacks |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
1.12 Common Security Problems |
8.7 Network Attacks |
22.11 Cross-site Scripting |
22.10 Types of SQLi and Prevention |
Standard |
1.3 Privacy & Security |
1.6 Common Security Problems |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
8.3 Impact of Cybersecurity |
8.2 What is Cybersecurity? |
Standard |
11.1 What is Cybersecurity? |
11.2 Impact of Cybersecurity |
12.4 Privacy & Security |
14.9 Common Security Problems |
14.11 Types of SQLi and Prevention |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
9.9 Common Security Problems |
9.11 Types of SQLi and Prevention |
12.2 Assessing Risks |
21.4 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
8.4 Privacy & Security |
16.3 Impact of Cybersecurity |
16.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.4 Privacy & Security |
6.9 Network Attacks |
6.10 Network Administration |
10.9 Common Security Problems |
10.11 Types of SQLi and Prevention |
10.12 Cross-site Scripting |
Standard |
2.4 Privacy & Security |
5.9 Network Attacks |
5.10 Network Administration |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.1 Privacy & Security |
Standard |
5.1 What is Cybersecurity? |
5.6 Privacy & Security |
Standard |
5.7 Privacy & Security |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
11.2 What is Cybersecurity? |
11.3 Impact of Cybersecurity |
Standard |
1.4 Privacy & Security |
Standard |
1.4 Privacy & Security |
Standard |
1.2 What is Cybersecurity? |
1.7 Privacy & Security |
Standard |
1.3 What is Cybersecurity? |
1.4 Impact of Cybersecurity |
2.4 Privacy & Security |
8.1 Network Attacks |
8.2 Malware Types and Prevention |
17.9 Common Security Problems |
17.9 Common Security Problems |
17.11 Types of SQLi and Prevention |
17.11 Types of SQLi and Prevention |
13.2 Assessing Risks |
Standard |
9.1 What is Cybersecurity? |
9.2 Impact of Cybersecurity |
Standard |
2.1 What is Cybersecurity? |
Standard |
10.4 Privacy & Security |
15.2 What is Cybersecurity? |
15.3 Impact of Cybersecurity |
Standard |
4.4 Privacy & Security |
Standard |
1.5 Privacy & Security |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
7.4 Common Security Problems |
7.6 Types of SQLi and Prevention |
13.1 Network Attacks |
13.2 Malware Types and Prevention |
13.3 Common Network Attacks |
13.5 Cross-site Scripting |
15.2 Assessing Risks |
Standard |
1.1 What is Cybersecurity? |
1.3 Privacy & Security |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
5.10 Common Security Problems |
5.12 Types of SQLi and Prevention |
13.2 Assessing Risks |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.2 What is Cybersecurity? |
1.3 Impact of Cybersecurity |
2.4 Privacy & Security |
8.9 Common Security Problems |
8.11 Types of SQLi and Prevention |
Standard |
4.4 Privacy & Security |
13.3 Impact of Cybersecurity |
13.2 What is Cybersecurity? |
Standard |
1.1 What is Cybersecurity? |
1.6 Privacy & Security |
- What is CodeHS?
- Curriculum
- Platform
- Assignments
- Classroom Management
- Grading
- Gradebook
- Progress Tracking
- Lesson Plans
- Offline Handouts
- Problem Guides
- Practice
- Create
- Problem Bank
- Playlist Bank
- Quiz Scores
- Rostering
- Integrations
- Professional Development
- Stories
- Standards
- States
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- D.C.
- Delaware
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington
- West Virginia
- Wisconsin
- Wyoming
- State Standards
- Plans
- Resources
- Districts
- Share
- Contact Us
- Company